Declutter Your Data

We are all guilty of holding on to things for way too long, trying to convince ourselves that we will use the item again. For example, that gadget that you received as a Sneaky Santa gift 20 years ago that, even today, you still have no clue how it works; or a sweatshirt that you wore as a teen that you believe one day you may fit into again. Just as we hoard physical “stuff,” we can also hoard digital “stuff” as well. 

Our lives are consumed with our digital devices, whether it be for work or pleasure. On average, adults spend 34-44 years of their lives looking at screens on mobile devices and computers. During those years we have stored up hundreds, if not thousands of emails, pictures, and other data digital content. This is called digital or data hoarding. It is a reluctance to get rid of data that no longer is needed. Some data is unusable or no longer holds value and yet is still saved and stored. How many times have you tried to send an email, realize said email was not sent because your inbox reached its maximum storage limit? The only way for the email to successfully go through is to clear some old emails out to allow more space. With digital storage capacities increasing we sometimes believe that we have infinite storage space. People have many reasons as to why they want to save data and some of those reasons are valid. For example, holding on to certain emails because it may need to be referenced at a later date could be a good reason to save that email. However, not all emails hold the same importance.

Digital data does not accumulate overnight. Over months and years, we gather all types of digital content. In 2017 Summit Hosting did a survey about digital hoarders, and what they found is the average American has at least seven open tabs in their browser, 13 unused phone apps, at least 15 unread emails, 20 desktop icons, over 500 saved cell phone pictures and about 87 bookmarks. Let’s also not forget text messages, video clips, social media friends and folders are also forms of digital clutter. 

While in the moment we justify saving certain data, there is a downside. The more data your hard drive has to manage, the harder it has to work. This could lead to device slow down. A slow device can make you less productive. There is also the security factor. Cyber criminals are always on the prowl looking for new ways to access a network. The more data we have, the more at risk we are to a cyber-attack. We also should think about effects on the environment. The cloud is often viewed as the arbitrary element of the digital world. Although we can’t technically see it, that data we put in the cloud is physically stored somewhere on actual servers. It takes a lot of energy to power those servers and to keep them running. 

One of the best things we can all do is to declutter our data... kind of like spring digital cleaning! Here are some tips that can help you jump start the process.

  • Unsubscribe to any newsletters or other digital notifications you don’t use. Also, when visiting websites, verify they do not automatically subscribe you to content or their mailing list.
  • Delete any duplicate files. If it is very important, back it up.
  • Once a month scroll through your devices and look at your cameral roll. Pictures that are blurry or any screen shots that are not needed should be deleted.
  • Check your text messages. Keeping text messages from five years ago may not be the best thing. Think about enabling your phones features that automatically delete messages after 30 days. 
  • Go through your apps. Only apps that are used on a regular basis should be on your device. Delete apps that are no longer needed.
  • Do social media inventory. Delete or unfollow who ever you do not interact with.
  • Empty the trash. Each week take time to empty your digital trash.
  • Organize your email. Set up filters to ensure important emails are never missed. 
Cryptocurrency Issues for Lenders and Borrowers: How to Proceed in the Absence of Industry Clarity
States are beginning to recognize cryptocurrency as a form of collateral under their Uniform Commercial Codes. As a result, commercial lenders and borrowers are learning more about their legal rights in cryptocurrency. Of particular concern for borrowers and lenders alike is the enforceability of a security interest on cryptocurrency as collateral. Forty-seven U.S. states have not passed legislation on cryptocurrency as an asset category, whereas Texas, Rhode Island and Wyoming have passed cryptocurrency legislation. These three states call cryptocurrency, “Virtual Currency”. The collateral is defined in Texas, for example, as “digital representation of value that functions as a medium of exchange, unit of account, and/or store of value and is often secured using blockchain technology”. To perfect its lien in cryptocurrency, a secured lender can file a financing statement or execute a “control” agreement. That said, it is unclear whether filing a financing statement is sufficient to put prospective secured parties on notice of a then-existing lien. As such, until the industry gains clarity on this matter, lenders need to perfect via “control” to have any certainty in the viability of the priority of their security interest.

Even how a lender goes about “controlling” Virtual Currency, though – which is also a perfection method for asset types such as deposit accounts and investment property – is less than crystal clear at this point. For a user to access cryptocurrency, one needs what is called a private “key.” As such, some prospective lender in this space might require possession of that private key as a condition to funding. However, unless a borrower does not plan to access its cryptocurrency during the course of a loan, from a practical matter, it seems unlikely that a borrower would want to give up its private key. Some industry experts have discussed similar control mechanisms that secured lenders use for deposit account collateral or other receivables, such as deposit account control agreements or source code escrow agreements. Still, until those control mechanisms make their way through the court system, it is impossible to know with any degree of certainty how those methods would work and if they would achieve the requisite “control” under the new law.

Shopping Online Securely

The holiday season is nearing. Soon millions of people will be looking to buy the perfect gifts, and many of us will shop online. Unfortunately, cyber criminals will be active as well, creating fake shopping websites and other online shopping scams to steal your information or money. Learn how you can find good deals without becoming a victim.

Fake Online Stores
Criminals create fake online stores that mimic the look of real sites or use the names of well-known stores or brands. When you search for the best online deals, you may find yourself at one of these fake sites. By purchasing from such websites, you can end up with counterfeit or stolen items, or your purchases might never be delivered. Take the following steps to protect yourself:

  • When possible, purchase from online stores you already know, trust, and have done business with previously. Bookmark these online stores.
  • Be suspicious of ads or promotions on search engines or social media that are significantly lower than those you see at the established online stores. If a deal sounds too good to be true, it may be a scam.
  • Be careful with websites that have no way to contact them, broken contact forms, or use personal email addresses.
  • Be suspicious if a website looks just like one you've used in the past, but the website domain name or the name of the store is different. For example, you may be used to shopping at Amazon, whose website address is, but end up at a fake website that looks similar, but has the website address
  • Type the name of the online store or its web address into a search engine to see what others have said about it. Look for terms like "fraud," "scam," "never again," and "fake."
  • Protect your online accounts by using a unique, strong password for each of your accounts. Can't remember all your passwords? Consider storing them all in a password manager.

Scammers on Legitimate Websites
Keep your guard up even when shopping at trusted websites. Online stores often offer products sold by third-parties - different individuals or companies - that might have fraudulent intentions. Such online destinations are like real-world markets, where some sellers are more trustworthy than others.

  • Check each seller's reputation before placing the order by reading their reviews.
  • Be wary of sellers who are new to the online store, lack reviews, or who sell items at unusually low prices.
  • Review the online store's policy on purchases from such third parties.
  • When in doubt, purchase items sold directly by the online store, not by the third-party sellers that participate in its online marketplace.
  • Even with legitimate vendors, be sure that you understand the seller’s warranty and return policies before you make your purchase.

Online Payments for Purchases
Regularly review your credit card statements to identify suspicious charges. If possible, enable the option to notify you by email, text, or app when a charge is made. If you find any suspicious activity, report it to your credit card company immediately. Use credit cards instead of debit cards for online payments. Debit cards take money directly from your bank account; if fraud is committed, you'll have a much harder time getting your money back. Electronic payment services or e-wallets such as PayPal are also a safer option for online purchases, since they do not require you to disclose a credit card number to the vendor. Avoid websites that only accept payment in cryptocurrency or require obscure payment methods.

Just because an online store has a professional look does not mean it's legitimate. If the website makes you uncomfortable, don't use it. Instead, head to a well-known site you can trust or have safely used in the past. You may not find that incredible deal, but you are much more likely to avoid getting scammed.
Please Note: the following Adobe products are end of life and are no longer being supported by Adobe! Adobe will no longer issue updates or security patches for these products.

  • Acrobat X Pro
  • Acrobat X Standard
  • Acrobat X Suite
  • Acrobat XI Pro
  • Acrobat XI Standard
Proofpoint is offering complimentary Awareness Training Kits. The kits give you the tools you need to engage your users and turn them into a strong line of defense against phishing attacks and other cyber threats.

The kits cover Phishing and Password Awareness. Download them now!

And if you are interested in acquiring Proofpoint for your organization, please contact your Account Executive today!
AaSys Advisory Regarding SmartSheet
AaSys has been in the process of converting our document storage process from the older portal to SmartSheet. AaSys hopes to have all customers converted from using the portal to using SmartSheet by January 2022. In the past, the portal was used to not only upload requested documents, but also as a place to store and archive important documents.  AaSys is taking a very conservative approach and electing not to use SmartSheet for storage. It was really designed to share documents and enhance the project management process. With this in mind, only current active documents will be available on SmartSheet and we will be clearing these documents as they are no longer needed. AaSys will be saving documents on a secure server; however, you should save them on your network/storage as well for easy access. Thanks for your help in reaching this goal. If you have questions or concerns, please feel free to contact your Account Executive.  
We have so much to be thankful for, most of all YOU! Thank you for being a part of our journey this year. Happy Thanksgiving!
2021 Company Holidays
Thursday, November 25, 2021 - Thanksgiving Day
Friday, November 26, 2021 - AaSys will close at 2:00 PM EST
Friday, December 24, 2021 - Christmas Eve Day (AaSys will close at 12:00 PM EST)
Saturday, December 25, 2021 - Christmas Day
Friday, December 31, 2021 - New Year's Eve (AaSys will close at 2:00 PM EST)
Saturday, January 1, 2022 - New Year's Day
AaSys Group, Inc.
11301 North US Highway 301
Suite 106
Thonotosassa, FL 33592
(813) 246-4757 Phone
(813) 246-4576 Fax